Open Access

Exploring Security Issues and Solutions in Cloud Computing Services – A Survey


Cite

1. Hogan, M., A. Sokol. NIST Cloud Computing Standards Roadmap. Version 2. NIST Cloud Computing Standards Roadmap Working Group. NIST Special Publications 500-291, NIST, Gaithersburg, MD, 2013, pp. 1-113.Search in Google Scholar

2. Columbus, L. Roundup of Cloud Computing Forecasts and Market Estimates 2016. 13 March 2016. https://www.forbes.com/sites/louiscolumbus/2016/03/13/roundup-of-cloud-computingforecasts-and-market-estimates-2016/#1c7e6a002187Search in Google Scholar

3. Khalil, I. M., A. Khreishah, M. Azeem. Cloud Computing Security: A Survey. -Computers, Vol. 3, 2014, pp. 1-35.10.3390/computers3010001Search in Google Scholar

4. Subashini, A., V. Kavith a. A Survey on Security Issues in Service Delivery Models of Cloud Computing. - Journal of Network and Computer Applications, Elsevier, Vol. 34, 2011, Issue 1, pp. 1-11.10.1016/j.jnca.2010.07.006Search in Google Scholar

5. HariKrishna, B., S. Kiran, G. Murali, PradeepKumar, R. Reddy. Security Issues in Service Model of Cloud Computing Environment. - Procedia Computer Science, Vol. 87, 2016, pp. 246-251.10.1016/j.procs.2016.05.156Search in Google Scholar

6. Bhadauria, R., S. Sanyal. Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques. - International Journal of Computer Applications, Vol. 47, 2012, No 18, pp. 47-66.10.5120/7292-0578Search in Google Scholar

7. Hashizume, K., D. G. Rosado, E. Ferná n d e z-Medina, E. B. Fernande z. An Analysis of Security Issues for Cloud Computing. - Journal of Internet Services and Applications, Vol. 4, 2013, No 5.10.1186/1869-0238-4-5Search in Google Scholar

8. Aldossary, S., W. Allen. Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions. - International Journal of Advanced Computer Science and Applications, Vol. 7, 2016, No 4.10.14569/IJACSA.2016.070464Search in Google Scholar

9. Catteddu, D., G. Hogben. Cloud Computing: Benefits, Risks and Recommendations for Information Security. European Union Agency for Network and Information Security (ENISA), 2009, pp. 1-125.Search in Google Scholar

10. Sumitra, B., C. R. Pethuru, M. Misbahuddin. A Survey of Cloud Authentication Attacks and Solution Approaches. - International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, 2014, Issue 10, pp. 6245-6253.Search in Google Scholar

11. Sushmitha, Y., V. KrishnaReddy, PavanDeja, D. Reddy. A Survey on Cloud Computing Security Issues. - International Journal of Computer Science and Innovation, Vol. 2015, 2015, No 2, pp. 88-96.Search in Google Scholar

12. HerbertRaj, P., P. RaviKumar, P. Jelciana. Mobile Cloud Computing: A Survey on Challenges and Issues. - International Journal of Computer Science and Information Security, Vol. 14, 2016, No 12, pp. 165-170.Search in Google Scholar

13. Brunette, G., R. Mo g h u l. Security Guidance for Critical Area of Focus in Cloud Computing. V2.1. Cloud Security Alliance (CSA). 2009, pp. 1-76.Search in Google Scholar

14. Xiao, Z., Y. Xiao. Security and Privacy in Cloud Computing. - IEEE Communications Surveys & Tutorial, Vol. 15, 2012, No 2, pp. 843-859.10.1109/SURV.2012.060912.00182Search in Google Scholar

15. Reed, A., C. Rezek, P. Simmonds. Security Guidance for Critical Area of Focus in CloudComputing. V3.0. Cloud Security Alliance (CSA). 2011, pp. 1-177. Search in Google Scholar

16. Price, D. The Challenges of Multi-Tenancy. 26 March 2014. https://cloudtweaks.com/2014/03/challenges-multi-tenancy/Search in Google Scholar

17. RaviKumar, P., P. HerbertRaj, P. Jelciana. Exploring Data Seurity Issues and Solutions in Cloud Computing. - In: Proc. of 6th International Conference on Smart Computing and Communication (ICSCC’17)), National Institute of Technology, Kurukshetra, India, 7-8 December 2017.10.1515/cait-2017-0039Search in Google Scholar

18. Ludwig, S. Cloud 101: What the Heck Do IaaS, PaaS and SaaS Companies Do? VentureBeat, 14 November 2011. https://venturebeat.com/2011/11/14/cloud-iaas-paas-saas/Search in Google Scholar

19. Sookhak, M., H. Talebian, E. Ahmed, A. Gani, M. K. Khan. A Review on Remote Data Auditing in Single Cloud Server: Taxonomy and Open Issues. - Journal of Network and Computer Applications, Vol. 43, 2014, pp. 121-141.10.1016/j.jnca.2014.04.011Search in Google Scholar

20. Wo rlanyo, E. A Survey of Cloud Computing Security: Issues, Challenges and Solutions. 30 November 2015. http://www.cse.wustl.edu/~jain//cse570-15/ftp/cld_sec/index.htmlSearch in Google Scholar

21. Amazon Web Services: Overview of Security Processes. August 2016. https://d0.awsstatic.com/whitepapers/aws-security-whitepaper.pdfSearch in Google Scholar

22. Pesante, L. Introduction to Information Security. Carnegie Mellon University, 2008. https://www.us-cert.gov/sites/default/files/publications/infosecuritybasics.pdfSearch in Google Scholar

23. Sabahi, F. Secure Virtualization for Cloud Environment Using Hypervisor-Based Technology. - International Journal of Machine Learning and Computing, Vol. 2, 2012, No 1, pp. 39-45.10.7763/IJMLC.2012.V2.87Search in Google Scholar

24. Gallagher, P. R. A Guide to Understanding Data Remanence in Automated Information Systems. The Rainbow Books. Chapter 3 and 4. 1991.Search in Google Scholar

25. OWASP Top 10 Application Security Risks - 2017. Open Web Application Security Project (OWASP). https://www.owasp.org/index.php/Category:OWASP_Top_Ten_2017_ProjectSearch in Google Scholar

26. Taylor, P. J., J. Nufryk. CompTIA Security+ Exam Study Material, 2014. Search in Google Scholar

27. Rathie, I. An Approach to Application Security. SANS Security Essentials White Paper, SANS Institute. https://www.sans.org/reading-room/whitepapers/application/approach-applicationsecurity-16Search in Google Scholar

28. OWASP Top 10 Backdoors, Open Web Application Security Project (OWASP). https://www.owasp.org/images/a/ae/OWASP_10_Most_Common_Backdoors.pdfSearch in Google Scholar

29. Rouse, M. Data Integrity. September 2005. http://searchdatacenter.techtarget.com/definition/integritySearch in Google Scholar

30. Sun, Y., J. Zhang, Y. Xiong, G. Zhu. Data Security and Privacy in Cloud Computing. - International Journal of Distributed Sensor Networks, Vol. 10, 2014, Issue 7, pp. 1-9.10.1155/2014/190903Search in Google Scholar

31. Wang, C., S. Chow, Q. Wang, K. Ren, W. Lou. Privacy-Preserving Public Auditing for Secure Cloud Storage. - IEEE Transactions on Computers, Vol. 62, 2013, Issue 2, pp. 362-375.10.1109/TC.2011.245Open DOISearch in Google Scholar

32. Balusamy, B., P. Venkatak rishna, A. Vaidhyanathan, M. Ravikumar, N. Devi Munisamy. Enhanced Security Framework for Data Integrity Using Third-Party Auditing in the Cloud System. - In: Proc. of Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Springer, Vol. 325, 2015, pp. 25-31.10.1007/978-81-322-2135-7_4Search in Google Scholar

33. Atieniese, G., R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song. Provable Data Possession at Untrusted Stores. - In: Proc. of 14th ACM Conference on Computer and Communication Security, 2007, pp. 598-609.10.1145/1315245.1315318Search in Google Scholar

34. Atieniese, G., R. DiPuetro, L. V. Mancini, G. Tsudik. Scalable and Efficient Provable Data Possession. - In: Proc. of 4th International Conference on Security and Privacy in Communication Networks, Art. 9, 2008.10.1145/1460877.1460889Search in Google Scholar

35. Atieniese, G., R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, D. Song. Remote Data Checking using Provable Data Possession. - ACM Transaction of Information and System Security, Vol. 14, 2011, No 1, pp. 12-34.10.1145/1952982.1952994Search in Google Scholar

36. Wang, Q., C. Wang, K. Ren, W. Lou, J. L i. Enable Public Auditability and Data Dynamics for Storage Security in Cloud Computing. - IEEE Transactions of Parallel and Distributed Systems, Vol. 22, 2011, No 5, pp. 847-859.10.1109/TPDS.2010.183Search in Google Scholar

37. Sookhak, M., A. Gani, M. K. Khan, R. Buyya. Dynamic Remote Data Auditing for Securing Big Data Storage in Cloud Computing. - Information Sciences: An International Journal, Vol. 380, 2017, Issue C, pp. 101-116.10.1016/j.ins.2015.09.004Search in Google Scholar

38. CSCC Security for Cloud Computing Ten Steps to Ensure Success. - Cloud Standards Customer Council, 2015, pp. 1-35.Search in Google Scholar

39. Rouse, M. Authentication. February 2015. http://searchsecurity.techtarget.com/definition/authenticationSearch in Google Scholar

40. Shinder, D. L. Authentication in the Cloud. InfoSec Institute.13 August 2014. http://resources.infosecinstitute.com/authentication-cloud/#grefSearch in Google Scholar

41. Jakimoski, K. Security Techniques for Data Protection in Cloud Computing. - International Journal of Grid and Distributed Computing, Vol. 9, 2016, No 1, pp. 49-56.10.14257/ijgdc.2016.9.1.05Search in Google Scholar

42. Ferril l. T. The Best Identity Management Solutions of 2017. 3 July 2017. https://www.pcmag.com/article2/0,2817,2491437,00.aspSearch in Google Scholar

43. Data Backup: Cloud Computing VS On-Site Options. https://www.staples.com/content-hub/data-backup-cloud-computing-vs-on-site-options/Search in Google Scholar

44. Cloud Middleware. https://www.techopedia.com/definition/30630/cloud-middleware-softwareSearch in Google Scholar

45. Farahzadi, A., P. Shams, J. Rezazadeh, R. Farahbak h s h. Middleware Technologies for Cloud of Things - A Survey. - Digital Communications and Networks, Elsevier, 18 April 2017. https://doi.org/10.1016/j.dcan.2017.04.00510.1016/j.dcan.2017.04.005Open DOISearch in Google Scholar

46. Nolle, T. How to Address Security Risks Posed by Middleware Tools. December 2014. http://searchmicroservices.techtarget.com/tip/How-to-address-security-risks-posed-bymiddleware-toolsSearch in Google Scholar

47. Role of Cloud Computing Operating Systems. 8 March 2013. http://www.getcloudservices.com/blog/role-of-cloud-computing-os/Search in Google Scholar

48. Hurwitz, J., M. Kaufma n. The Role of the Operating System in the Cloud Environment. Hurwitz White Paper, 2011. https://www.redhat.com/f/pdf/The_Role_of_the_OS_in_the_Cloud.pdfSearch in Google Scholar

49. The Operating System Hardening Issues and Practices Information Technology Essay. 23 March 2015. https://www.ukessays.com/essays/information-technology/the-operating-systemhardening-issues-and-practices-information-technology-essay.phpSearch in Google Scholar

50. Liu, Y., Y. Sun, J. Ryoo, S. Rizvi. A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions. - Journal of Computing Science and Engineering, Vol. 9, 2015, No 3, pp. 119-133.10.5626/JCSE.2015.9.3.119Search in Google Scholar

51. Ristenpart, T., E. Tromer, H. Shacham, S. Savage. Hey, You Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. - In: Proc. of 16th ACM Conference on Computer and Communications Security, ACM, 2009, pp. 199-212.Search in Google Scholar

52. Aviram, A., S. Hu, B. Ford, R. Gummad i. Determinating Timing Channels in Compute Clouds. - In: Proc. of ACM Workshop on Cloud Computing Security Workshop, ACM, 2010, pp. 103-108.10.1145/1866835.1866854Search in Google Scholar

53. Jansen, W. A. Cloud Hooks: Security and Privacy Issues in Cloud Computing. - In: Proc. of IEEE 44th Hawaii International Conference on System Sciences (HICSS’11), IEEE, 2011, pp. 1-10.Search in Google Scholar

54. Wu, H., Y. Ding, C. Winer, L. Yao. Network Security for Virtual Machine in Cloud Computing. - In: Proc. of IEEE 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT’10), IEEE, 2010, pp. 18-21.Search in Google Scholar

55. Song, M. H. Analysis of Risks for Virtualization Technology. - Applied Mechanics and Materials, Vol. 539, 2014, pp. 374-377. 10.4028/www.scientific.net/AMM.539.374Search in Google Scholar

56. Corradi, A., M. Fanelli, L. Foschini. VM Consolidation: A Real Case Based on OpenStack Cloud. - Future Generation Computer Systems, Vol. 32, 2014, pp. 118-127.10.1016/j.future.2012.05.012Open DOISearch in Google Scholar

57. Zhang, F., H. Chen. Security-Preserving Live Migration of Virtual Machines in the Cloud. - Journal of Network and Systems Management, Vol. 21, 2013, No 4, pp. 562-587.10.1007/s10922-012-9253-1Search in Google Scholar

58. Cloud Server. https://www.techopedia.com/definition/29019/cloud-serverSearch in Google Scholar

59. What is a Cloud Server? IBM Cloud. https://www.ibm.com/cloud-computing/learn-more/what-is-a-cloud-server/Search in Google Scholar

60. Web Server Security and Database Server Security. https://www.acunetix.com/websitesecurity/webserver-security/Search in Google Scholar

61. Ellingwood, J. 7 Security Measures to Protect Your Servers. 5 March 2015. https://www.digitalocean.com/community/tutorials/7-security-measures-to-protectyour-serversSearch in Google Scholar

62. Chakravarty, A. Importance of the Network in Cloud Computing. 25 January 2012. https://blogs.cisco.com/datacenter/importance-of-the-network-in-cloud-computingSearch in Google Scholar

63. Schoo, P., V. Fusenig, V. Souza, M. Melo, P. Murray, H. Debar, H. Medhioub, D. Zeghlach e. Challenges for Cloud Networking Security. - In: Proc. of International Conference on Mobile Networks and Management, 2010, pp. 298-313.10.1007/978-3-642-21444-8_26Search in Google Scholar

64. Wang, J. J., S. Mu. Security Issues and Countermeasures in Cloud Computing. - In: Proc. of IEEE International Conference on Grey Systems and Intelligent Services (GSIS), 2011, pp. 843-846.10.1109/GSIS.2011.6043978Search in Google Scholar

65. McAfee Labs Threats Report. March 2016. https://www.mcafee.com/us/resources/reports/rp-quarterly-threats-mar-2016.pdfSearch in Google Scholar

66. Top 7 Network Attack Types in 2016. Calyptix Blog. 13 June 2016. https://www.calyptix.com/top-threats/top-7-network-attack-types-2016/Search in Google Scholar

67. Ransom.WannaCry. Symantec Security Response. 24 May 2017. https://www.symantec.com/security_response/writeup.jsp?docid=2017-051310-3522-99&tabid=2Search in Google Scholar

68. Dalziel, H. Summary of 5 Major DoS Attack Types. 1 November 2013. https://www.concise-courses.com/5-major-types-of-dos-attack/Search in Google Scholar

69. DDOS Attacks. https://www.incapsula.com/ddos/ddos-attacks/Search in Google Scholar

70. Rouse, M. DNS Attack. July 2015. http://searchsecurity.techtarget.com/definition/DNS-attackSearch in Google Scholar

71. Common Types of Network Attacks. https://technet.microsoft.com/en-us/library/cc959354.aspxSearch in Google Scholar

72. Vieira, K., A. Schulter, C. B. Westphall, C. M. Westphall. Intrusion Detection for Grid and Cloud Computing. - IT Professional, IEEE Computer Society, Vol. 12, 2010, Issue 4, pp. 38-43.10.1109/MITP.2009.89Search in Google Scholar

73. Lo, C. C., C. C. Huang, J. K u. A Cooperative Intrusion Detection System Framework for Cloud Computing Networks. - In: Proc. of 39th International Conference on Parallel Processing Workshops (ICPPW), IEEE, 2010, pp. 280-284.10.1109/ICPPW.2010.46Search in Google Scholar

74. Rouse, M. Secure Sockets Layer (SSL). November 2016. http://searchsecurity.techtarget.com/definition/Secure-Sockets-Layer-SSLSearch in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology